Armis Security Ltd.

Israël

Retour au propriétaire

1-68 de 68 pour Armis Security Ltd. Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 67
        Marque 1
Juridiction
        États-Unis 45
        International 23
Date
Nouveautés (dernières 4 semaines) 2
2026 avril (MACJ) 2
2026 février 1
2025 décembre 1
2026 (AACJ) 3
Voir plus
Classe IPC
H04L 9/40 - Protocoles réseaux de sécurité 36
G06N 20/00 - Apprentissage automatique 19
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures 14
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité 12
G06N 5/04 - Modèles d’inférence ou de raisonnement 12
Voir plus
Classe NICE
09 - Appareils et instruments scientifiques et électriques 1
42 - Services scientifiques, technologiques et industriels, recherche et conception 1
Statut
En Instance 15
Enregistré / En vigueur 53

1.

MALICIOUS LATERAL MOVEMENT DETECTION USING REMOTE SYSTEM PROTOCOLS

      
Numéro d'application 19360103
Statut En instance
Date de dépôt 2025-10-16
Date de la première publication 2026-04-16
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Ben Zvi, Gil
  • Shoham, Ron
  • Friedlander, Yuval

Abrégé

A system and method for malicious lateral movement detection. A method includes identifying atomic tunnels in packets sent between devices; identifying tunnel constructs; determining a potentially malicious atomic tunnel among the atomic tunnels by comparing edges of each of the atomic tunnels to edges of previously observed tunnel constructs; determining a potentially malicious tunnel including the potentially malicious atomic tunnel; and mitigating the potentially malicious tunnel. Each atomic tunnel is a structure representing communications among the devices defined with respect to at least three nodes and at least two edges. Each node represents a respective device, and each edge represents a connection between two of the devices. Each atomic tunnel has two hops, where each hop is a level of communication in which a packet is sent from one device to another device. Each tunnel construct is a structure including at least one of the atomic tunnels.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

2.

ANOMALY DETECTION AND MITIGATION USING DEVICE SUBPOPULATION PARTITIONING

      
Numéro d'application 19277311
Statut En instance
Date de dépôt 2025-07-22
Date de la première publication 2026-04-16
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Shoham, Ron

Abrégé

A system and method for anomaly detection. A method includes recursively partitioning a sample of device activity data including deterministic characteristics of a population of devices over iterations in order to create partitions. Each iteration includes determining a split density metric for a candidate subpopulation created by splitting a portion of the population with respect to a corresponding type of deterministic characteristic. The split density metric for the candidate subpopulation is determined based on a density value of the candidate subpopulation and a coverage value of the corresponding type of deterministic characteristic. The partitions include each candidate subpopulation meeting a split density metric threshold. A baseline for each of the partitions is established based on device activity for devices represented in device activity data of the partition. An anomaly is detected based on behavior of a device and the baseline established for a partition corresponding to the device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 18/23 - Techniques de partitionnement
  • H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux

3.

SYSTEM AND METHOD FOR OPERATING SYSTEM DISTRIBUTION AND VERSION IDENTIFICATION USING COMMUNICATIONS SECURITY FINGERPRINTS

      
Numéro d'application 19253042
Statut En instance
Date de dépôt 2025-06-27
Date de la première publication 2026-02-26
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Sarel, Yuval
  • Seri, Ben
  • Friedlander, Yuval
  • Hanetz, Tom
  • Ben Zvi, Gil
  • Shoham, Ron

Abrégé

A system and method for inferring an operating system version for a device based on communications security data. A method includes identifying a plurality of sequences in communications security data sent by the device; determining an operating system type of an operating system used by the device based on the identified plurality of sequences; applying a version-identifying model to the identified plurality of sequences, wherein the version-identifying model is a machine learning model trained to output a version identifier, wherein the applied version-identifying model is associated with the determined operating system type; and determining the operating system version of the device based on the output of the version-identifying model.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

4.

SYSTEM AND METHOD FOR DETECTING CYBERSECURITY VULNERABILITIES VIA DEVICE ATTRIBUTE RESOLUTION

      
Numéro d'application 19215793
Statut En instance
Date de dépôt 2025-05-22
Date de la première publication 2025-12-18
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Hanetz, Tom
  • Shoham, Ron
  • Friedlander, Yuval
  • Ben Zvi, Gil

Abrégé

A system and method for vulnerability detection. A method includes: tokenizing device attribute data for a device into at least one set of first tokens, wherein each of the first tokens is formatted according to a token schema; creating at least one device attribute string, each device attribute string including one of the first tokens; matching each of the at least one device attribute string to combinations of device attributes stored in a vulnerabilities database in order to identify at least one matching combination of device attributes for the device, wherein the vulnerabilities database stores mappings between combinations of device attributes and vulnerabilities, wherein each combination of device attributes in the vulnerabilities database includes second tokens formatted according to the token schema; detecting at least one vulnerability of the device based on the at least one matching combination of device attributes and the mappings in the vulnerabilities database.

Classes IPC  ?

  • G06F 21/73 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par création ou détermination de l’identification de la machine, p. ex. numéros de série
  • G06F 16/14 - Détails de la recherche de fichiers basée sur les métadonnées des fichiers
  • G06F 16/242 - Formulation des requêtes
  • G06F 16/903 - Requêtes
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/40 - Protocoles réseaux de sécurité

5.

ANOMALY DETECTION IN NETWORK TRAFFIC DATA

      
Numéro d'application IB2025054307
Numéro de publication 2025/224683
Statut Délivré - en vigueur
Date de dépôt 2025-04-24
Date de publication 2025-10-30
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Keisar, Bar
  • Burabia, Gabi
  • Ben Akoune, Elad
  • Tzur-Hilleli, Michal

Abrégé

This disclosure relates to systems, methods, and devices for identifying anomalous network activity. In some embodiments, a baseline model is used for identifying anomalous network activity. In some embodiments, anomalous network activity is detected based on a z-score, modified z-score, or both being above respective thresholds when compared to the baseline. In some embodiments, multiple baseline models are used, and anomalous network activity is detected when multiple baseline models identify a network activity session as anomalous. In some embodiments, two baseline models are used.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 9/40 - Protocoles réseaux de sécurité

6.

ANOMALY DETECTION IN NETWORK TRAFFIC DATA

      
Numéro d'application 19188840
Statut En instance
Date de dépôt 2025-04-24
Date de la première publication 2025-10-30
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Keisar, Bar
  • Burabia, Gabi
  • Ben Akoune, Elad
  • Tzur-Hilleli, Michal

Abrégé

This disclosure relates to systems, methods, and devices for identifying anomalous network activity. In some embodiments, a baseline model is used for identifying anomalous network activity. In some embodiments, anomalous network activity is detected based on a z-score, modified z-score, or both being above respective thresholds when compared to the baseline. In some embodiments, multiple baseline models are used, and anomalous network activity is detected when multiple baseline models identify a network activity session as anomalous. In some embodiments, two baseline models are used.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

7.

SYSTEM AND METHOD FOR DETECTION OF ABNORMAL DEVICE TRAFFIC BEHAVIOR

      
Numéro d'application 19032844
Statut En instance
Date de dépôt 2025-01-21
Date de la première publication 2025-08-14
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron
  • Friedlander, Yuval

Abrégé

A system and method for detecting abnormal device traffic behavior. The method includes creating a baseline clustering model for a device based on a training data set including traffic data for the device, wherein the baseline clustering model includes a plurality of clusters, each cluster representing a discrete state and including a plurality of first data points of the training data set; sampling a plurality of second data points with respect to windows of time in order to create at least one sample, each sample including at least a portion of the plurality of second data points, wherein the plurality of second data points are related to traffic involving the device; and detecting anomalous traffic behavior of the device based on the at least one sample and the baseline clustering model.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • G06N 20/00 - Apprentissage automatique

8.

SYSTEMS AND METHODS FOR ASSET IDENTIFICATION

      
Numéro d'application IB2025051044
Numéro de publication 2025/163563
Statut Délivré - en vigueur
Date de dépôt 2025-01-30
Date de publication 2025-08-07
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Ladelsky Lellouch, Shiri
  • Ravid, Tal
  • Nagar, Eyal

Abrégé

The present disclosure provides systems and methods for asset identification and consolidation in a network. In some implementations, the methods involve receiving data including a plurality of media access control (MAC) addresses from at least one source, analyzing the received MAC addresses to determine one or more MAC addresses that are repeated in the received data, and labeling the repeated MAC addresses as weak identifiers for asset identification. Some implementations herein enable improved accuracy in identifying and consolidating network assets by distinguishing between reliable and unreliable identifiers, thereby enhancing network security and management capabilities.

Classes IPC  ?

  • H04L 61/5046 - Résolution des conflits d'allocation d'adressesTest des adresses
  • H04L 61/09 - Correspondance entre adresses
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 101/622 - Adresses de couche 2, p. ex. adresses de contrôle d'accès au support [MAC]
  • H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes
  • H04L 61/50 - Allocation d'adresse

9.

SYSTEMS AND METHODS FOR ASSET IDENTIFICATION

      
Numéro d'application 19042716
Statut En instance
Date de dépôt 2025-01-31
Date de la première publication 2025-07-31
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Ladelsky Lellouch, Shiri
  • Ravid, Tal
  • Nagar, Eyal

Abrégé

The present disclosure provides systems and methods for asset identification and consolidation in a network. In some implementations, the methods involve receiving data including a plurality of media access control (MAC) addresses from at least one source, analyzing the received MAC addresses to determine one or more MAC addresses that are repeated in the received data, and labeling the repeated MAC addresses as weak identifiers for asset identification. Some implementations herein enable improved accuracy in identifying and consolidating network assets by distinguishing between reliable and unreliable identifiers, thereby enhancing network security and management capabilities.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

10.

VULNERABILITY RATING ENGINE

      
Numéro d'application IB2025050541
Numéro de publication 2025/154026
Statut Délivré - en vigueur
Date de dépôt 2025-01-17
Date de publication 2025-07-24
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Ben Akoune, Elad
  • Berland, Roy
  • Peled, Tal

Abrégé

The present disclosure relates to systems and methods for determining comprehensive and asset vulnerability ratings using models such as artificial intelligence (AI) and machine learning (ML) models. These models can identify relevant attributes, optimize attribute values, and determine logical relationships between attributes. The term "model" encompasses various types of AI and ML models, including neural networks, language models, multimodal models, and others. Models can be trained using supervised learning with labeled data to predict or classify new data items. The models can be locally hosted, cloud-managed, or accessed via APIs, and can be implemented in electronic hardware such as computer processors.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06N 20/00 - Apprentissage automatique
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/12 - Détection ou prévention de fraudes
  • H04W 12/10 - Intégrité
  • H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]
  • G08B 23/00 - Alarmes réagissant à des conditions indésirables ou anormales, non spécifiées
  • G06F 11/30 - Surveillance du fonctionnement

11.

SYSTEM AND METHOD FOR INFERRING DEVICE TYPE BASED ON PORT USAGE

      
Numéro d'application 19006655
Statut En instance
Date de dépôt 2024-12-31
Date de la première publication 2025-07-17
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron

Abrégé

A system and method for inferring device types. A method includes selecting a device type inference model from among a plurality of device type inference models based on a manufacturer of a device, wherein each device type inference model corresponds to a respective manufacturer and is trained using training data of devices manufactured by the respective manufacturer, wherein each device type inference model is trained to output a device type prediction; and determining an inferred device type for the device, wherein determining the inferred device type for the device further comprises applying the selected device type inference model to a plurality of features, wherein the plurality of features is extracted from device activity data indicating ports used by the device and at least one volume of traffic communicated via each port used by the device.

Classes IPC  ?

  • G05B 19/418 - Commande totale d'usine, c.-à-d. commande centralisée de plusieurs machines, p. ex. commande numérique directe ou distribuée [DNC], systèmes d'ateliers flexibles [FMS], systèmes de fabrication intégrés [IMS], productique [CIM]
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • H04L 9/40 - Protocoles réseaux de sécurité

12.

VULNERABILITY RATING ENGINE

      
Numéro d'application 19030368
Statut En instance
Date de dépôt 2025-01-17
Date de la première publication 2025-07-17
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Akoune, Elad Ben
  • Berland, Roy
  • Peled, Tal

Abrégé

The present disclosure relates to systems and methods for determining comprehensive and asset vulnerability ratings using models such as artificial intelligence (AI) and machine learning (ML) models. These models can identify relevant attributes, optimize attribute values, and determine logical relationships between attributes. The term “model” encompasses various types of AI and ML models, including neural networks, language models, multimodal models, and others. Models can be trained using supervised learning with labeled data to predict or classify new data items. The models can be locally hosted, cloud-managed, or accessed via APIs, and can be implemented in electronic hardware such as computer processors.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus

13.

Techniques for securing network environments by identifying device attributes based on string field conventions

      
Numéro d'application 18732000
Numéro de brevet 12386947
Statut Délivré - en vigueur
Date de dépôt 2024-06-03
Date de la première publication 2025-01-30
Date d'octroi 2025-08-12
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Hanetz, Tom
  • Friedlander, Yuval
  • Ben Zvi, Gil

Abrégé

A system and method for identifying device attributes based on string field conventions. A method includes applying at least one machine learning model to an application data set extracted based on a string indicated in a field of device data corresponding to a device, wherein each of the at least one machine learning model is trained based on a training data set including a plurality of second strings and a plurality of device attribute labels, wherein each device attribute label corresponds to a respective second string of the plurality of second strings, wherein each of the at least one machine learning model is configured to output a predicted device attribute for the device based on the first string; and identifying, based on the output of the at least one machine learning model, a device attribute of the device.

Classes IPC  ?

  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

14.

Techniques for enriching device profiles and mitigating cybersecurity threats using enriched device profiles

      
Numéro d'application 18746270
Numéro de brevet 12574399
Statut Délivré - en vigueur
Date de dépôt 2024-06-18
Date de la première publication 2024-12-12
Date d'octroi 2026-03-10
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron

Abrégé

Systems and methods for device profile enrichment. A method includes determining a plurality of distributions of device attributes with respect to a plurality of fields of a predefined device profile schema; generating a plurality of inference rules based on the plurality of distributions of device attributes, wherein each inference rule indicates at least one required device attribute and at least one inferred device attribute; creating an ordered set of inference rules including the plurality of inference rules organized with respect to a plurality of scores, each score corresponding to one of the plurality of inference rules, wherein the score for each inference rule is determined based on the at least one required device attribute of the inference rule; and enriching at least one device profile by iterating the ordered set of inference rules, wherein enriching a device profile includes adding at least one device attribute value to the device profile.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 5/04 - Modèles d’inférence ou de raisonnement

15.

System and method for mitigating cyber security threats by devices using risk factors

      
Numéro d'application 18734707
Numéro de brevet 12452289
Statut Délivré - en vigueur
Date de dépôt 2024-06-05
Date de la première publication 2024-12-12
Date d'octroi 2025-10-21
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Izrael, Nadir
  • Ladelsky Lellouch, Shiri
  • Seltzer, Misha

Abrégé

A system and method for mitigating cyber security threats by devices using risk factors. The method includes determining a plurality of risk factors for a device based on a plurality of risk behaviors indicated by network activity and information of the device, wherein the plurality of risk behaviors includes observed risk behaviors and assumed risk behaviors, wherein the observed risk behaviors are indicated by data related to network activity by the device, wherein the assumed risk behaviors are extrapolated based on known contextual information related to the device; determining a risk score for the device based on the plurality of risk factors and a plurality of weights, wherein each of the plurality of weights is applied to one of the plurality of risk factors; and performing at least one mitigation action based on the risk score.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

16.

System and method for determining device attributes using a classifier hierarchy

      
Numéro d'application 18632235
Numéro de brevet 12223406
Statut Délivré - en vigueur
Date de dépôt 2024-04-10
Date de la première publication 2024-08-01
Date d'octroi 2025-02-11
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Hanetz, Tom
  • Friedlander, Yuval

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes: sequentially applying a plurality of sub-models of a hierarchy to a plurality of features extracted from device activity data, wherein the sequential application ends with applying a last sub-model of the plurality of sub-models, wherein each sub-model includes a plurality of classifiers, wherein each sub-model outputs a class when applied to at least a portion of the plurality of features, wherein each class is a classifier output representing a device attribute, wherein applying the plurality of sub-models further comprises iteratively determining a next sub-model to apply based on the class output by a most recently applied sub-model and the hierarchy; and determining a device attribute based on the class output by the last sub-model.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06F 16/35 - PartitionnementClassement
  • G06F 18/2113 - Sélection du sous-ensemble de caractéristiques le plus significatif en classant ou en filtrant l'ensemble des caractéristiques, p. ex. en utilisant une mesure de la variance ou de la corrélation croisée des caractéristiques
  • G06F 18/213 - Extraction de caractéristiques, p. ex. en transformant l'espace des caractéristiquesSynthétisationsMappages, p. ex. procédés de sous-espace
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06F 18/24 - Techniques de classification
  • G06F 18/241 - Techniques de classification relatives au modèle de classification, p. ex. approches paramétriques ou non paramétriques
  • G06F 18/2431 - Classes multiples
  • G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
  • G06V 30/24 - Reconnaissance de caractères caractérisée par la méthode de traitement ou de reconnaissance

17.

Techniques for resolving contradictory device profiling data

      
Numéro d'application 18597947
Numéro de brevet 12381896
Statut Délivré - en vigueur
Date de dépôt 2024-03-07
Date de la première publication 2024-07-25
Date d'octroi 2025-08-05
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Gitelman, Shaked
  • Krespil-Lo, Adi

Abrégé

A system and method for resolving contradictory device profiling data. The method includes: determining a set of non-contradicting values and a set of contradicting values in device profiling data related to a device based on a plurality of conflict rules; merging values of the set of non-contradicting values in device profiling data into at least one first value; selecting at least one second value from the set of contradicting values, wherein selecting one of the at least one second value from each set of contradicting values further includes generating a certainty score corresponding to each value of the set of contradicting values, wherein each certainty score indicates a likelihood that the corresponding value is accurate, wherein the at least one second value is selected based on the certainty scores; and creating a device profile based on the at least one first value and the at least one second value.

Classes IPC  ?

18.

System and method for anomaly detection interpretation

      
Numéro d'application 18485297
Numéro de brevet 12328327
Statut Délivré - en vigueur
Date de dépôt 2023-10-11
Date de la première publication 2024-05-09
Date d'octroi 2025-06-10
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Shoham, Ron
  • Ben Zvi, Gil
  • Hanetz, Tom

Abrégé

A system and method for anomaly interpretation and mitigation. A method includes extracting at least one input feature vector from observation data related to an observation; applying an isolation forest to the at least one input feature vector, wherein the isolation forest includes a plurality of estimators, wherein each estimator is a decision tree, wherein the output of each estimator is a split-path of a plurality of split-paths, each split-path having a path-length and including name and a corresponding value for a respective output feature of a plurality of output features; generating a mapping object based on the application of the isolation forest to the at least one feature vector, wherein the mapping object includes the plurality of split-paths; clipping the mapping object based on the path-length of each split-path; and determining at least one mitigation action based on the clipped mapping object.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

19.

DETECTION OF VULNERABLE WIRELESS NETWORKS

      
Numéro d'application 18513552
Statut En instance
Date de dépôt 2023-11-18
Date de la première publication 2024-05-09
Propriétaire Armis Security Ltd (Israël)
Inventeur(s)
  • Schwartz, Tomer
  • Izrael, Nadir

Abrégé

A method and system for detecting vulnerable wireless networks coexisting in a wireless environment of an organization are provided. The method includes receiving intercepted traffic, wherein the intercepted traffic is transmitted by at least one wireless device operable in an airspace of the wireless environment, wherein the intercepted traffic is transported using at least one type of wireless protocol; analyzing the received traffic to detect at least one active connection between a legitimate wireless device of the at least one wireless device and at least one unknown wireless device, wherein the legitimate wireless device is at least legitimately authorized to access a protected computing resource of the organization; and determining if the at least one detected active connection forms a vulnerable wireless network.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/12 - Détection ou prévention de fraudes

20.

ANOMALY DETECTION AND MITIGATION USING DEVICE SUBPOPULATION PARTITIONING

      
Numéro d'application IL2023051012
Numéro de publication 2024/057328
Statut Délivré - en vigueur
Date de dépôt 2023-09-14
Date de publication 2024-03-21
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Shoham, Ron

Abrégé

A system and method for anomaly detection. A method includes recursively partitioning a sample of device activity data including deterministic characteristics of a population of devices over iterations in order to create partitions. Each iteration includes determining a split density metric for a candidate subpopulation created by splitting a portion of the population with respect to a corresponding type of deterministic characteristic. The split density metric for the candidate subpopulation is determined based on a density value of the candidate subpopulation and a coverage value of the corresponding type of deterministic characteristic. The partitions include each candidate subpopulation meeting a split density metric threshold. A baseline for each of the partitions is established based on device activity for devices represented in device activity data of the partition. An anomaly is detected based on behavior of a device and the baseline established for a partition corresponding to the device.

Classes IPC  ?

  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G05B 23/02 - Test ou contrôle électrique

21.

Anomaly detection and mitigation using device subpopulation partitioning

      
Numéro d'application 17932163
Numéro de brevet 12388855
Statut Délivré - en vigueur
Date de dépôt 2022-09-14
Date de la première publication 2024-03-14
Date d'octroi 2025-08-12
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Shoham, Ron

Abrégé

A system and method for anomaly detection. A method includes recursively partitioning a sample of device activity data including deterministic characteristics of a population of devices over iterations in order to create partitions. Each iteration includes determining a split density metric for a candidate subpopulation created by splitting a portion of the population with respect to a corresponding type of deterministic characteristic. The split density metric for the candidate subpopulation is determined based on a density value of the candidate subpopulation and a coverage value of the corresponding type of deterministic characteristic. The partitions include each candidate subpopulation meeting a split density metric threshold. A baseline for each of the partitions is established based on device activity for devices represented in device activity data of the partition. An anomaly is detected based on behavior of a device and the baseline established for a partition corresponding to the device.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 18/23 - Techniques de partitionnement
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux

22.

MALICIOUS LATERAL MOVEMENT DETECTION USING REMOTE SYSTEM PROTOCOLS

      
Numéro d'application IB2023057105
Numéro de publication 2024/013660
Statut Délivré - en vigueur
Date de dépôt 2023-07-11
Date de publication 2024-01-18
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Shoham, Ron
  • Ben Zvi, Gil
  • Friedlander, Yuval

Abrégé

A system and method for malicious lateral movement detection. A method includes identifying atomic tunnels in packets sent between devices; identifying tunnel constructs; determining a potentially malicious atomic tunnel among the atomic tunnels by comparing edges of each of the atomic tunnels to edges of previously observed tunnel constructs; determining a potentially malicious tunnel including the potentially malicious atomic tunnel; and mitigating the potentially malicious tunnel. Each atomic tunnel is a structure representing communications among the devices defined with respect to at least three nodes and at least two edges. Each node represents a respective device, and each edge represents a connection between two of the devices. Each atomic tunnel has two hops, where each hop is a level of communication in which a packet is sent from one device to another device. Each tunnel construct is a structure including at least one of the atomic tunnels.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 12/46 - Interconnexion de réseaux

23.

Malicious lateral movement detection using remote system protocols

      
Numéro d'application 17811699
Numéro de brevet 12470593
Statut Délivré - en vigueur
Date de dépôt 2022-07-11
Date de la première publication 2024-01-11
Date d'octroi 2025-11-11
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Ben Zvi, Gil
  • Shoham, Ron
  • Friedlander, Yuval

Abrégé

A system and method for malicious lateral movement detection. A method includes identifying atomic tunnels in packets sent between devices; identifying tunnel constructs; determining a potentially malicious atomic tunnel among the atomic tunnels by comparing edges of each of the atomic tunnels to edges of previously observed tunnel constructs; determining a potentially malicious tunnel including the potentially malicious atomic tunnel; and mitigating the potentially malicious tunnel. Each atomic tunnel is a structure representing communications among the devices defined with respect to at least three nodes and at least two edges. Each node represents a respective device, and each edge represents a connection between two of the devices. Each atomic tunnel has two hops, where each hop is a level of communication in which a packet is sent from one device to another device. Each tunnel construct is a structure including at least one of the atomic tunnels.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

24.

SYSTEM AND METHOD FOR DEVICE ATTRIBUTE IDENTIFICATION BASED ON QUERIES OF INTEREST

      
Numéro d'application IB2023055571
Numéro de publication 2023/233316
Statut Délivré - en vigueur
Date de dépôt 2023-05-31
Date de publication 2023-12-07
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Hanetz, Tom
  • Friedlander, Yuval
  • Ben Zvi, Gil

Abrégé

A system and method for determining device attributes based on host configuration protocols. A method includes identifying queries of interest among an application data set including queries for computer address data sent by at least one device, wherein each query of interest meets a respective threshold of at least one threshold for each of the at least one score output by a machine learning model, wherein the machine learning model is trained to output at least one score with respect to statistical properties of queries for computer address data; determining prediction thresholds by applying the machine learning model to a validation data set, wherein each prediction threshold corresponds to a respective output of the machine learning model; and determining, based on the prediction thresholds and the scores output by the machine learning model for the identified queries of interest when applied to the application dataset, device attributes for the device.

Classes IPC  ?

  • G06N 3/08 - Méthodes d'apprentissage
  • H04L 61/5014 - Adresses de protocole Internet [IP] en utilisant le protocole de configuration dynamique de l'hôte [DHCP] ou le protocole d'amorçage [BOOTP]
  • G06N 20/00 - Apprentissage automatique

25.

SYSTEM AND METHOD FOR DETECTING CYBERSECURITY VULNERABILITIES VIA DEVICE ATTRIBUTE RESOLUTION

      
Numéro d'application IB2023053857
Numéro de publication 2023/203457
Statut Délivré - en vigueur
Date de dépôt 2023-04-14
Date de publication 2023-10-26
Propriétaire
  • ARMIS SECURITY LTD. (Israël)
  • FRIEDLANDER, Yuval (Israël)
  • BEN ZVI, Gil (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Shoham, Ron
  • Hanetz, Tom

Abrégé

A system and method for vulnerability detection. A method includes: tokenizing device attribute data for a device into at least one set of first tokens, wherein each of the first tokens is formatted according to a token schema; creating at least one device attribute string, each device attribute string including one of the first tokens; matching each of the at least one device attribute string to combinations of device attributes stored in a vulnerabilities database in order to identify at least one matching combination of device attributes for the device, wherein the vulnerabilities database stores mappings between combinations of device attributes and vulnerabilities, wherein each combination of device attributes in the vulnerabilities database includes second tokens formatted according to the token schema; detecting at least one vulnerability of the device based on the at least one matching combination of device attributes and the mappings in the vulnerabilities database.

Classes IPC  ?

  • G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

26.

System and method for detecting cybersecurity vulnerabilities via device attribute resolution

      
Numéro d'application 17659572
Numéro de brevet 12346487
Statut Délivré - en vigueur
Date de dépôt 2022-04-18
Date de la première publication 2023-10-19
Date d'octroi 2025-07-01
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Hanetz, Tom
  • Shoham, Ron
  • Friedlander, Yuval
  • Ben Zvi, Gil

Abrégé

A system and method for vulnerability detection. A method includes: tokenizing device attribute data for a device into at least one set of first tokens, wherein each of the first tokens is formatted according to a token schema; creating at least one device attribute string, each device attribute string including one of the first tokens; matching each of the at least one device attribute string to combinations of device attributes stored in a vulnerabilities database in order to identify at least one matching combination of device attributes for the device, wherein the vulnerabilities database stores mappings between combinations of device attributes and vulnerabilities, wherein each combination of device attributes in the vulnerabilities database includes second tokens formatted according to the token schema; detecting at least one vulnerability of the device based on the at least one matching combination of device attributes and the mappings in the vulnerabilities database.

Classes IPC  ?

  • G06F 21/73 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par création ou détermination de l’identification de la machine, p. ex. numéros de série
  • G06F 16/14 - Détails de la recherche de fichiers basée sur les métadonnées des fichiers
  • G06F 16/242 - Formulation des requêtes
  • G06F 16/903 - Requêtes
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/40 - Protocoles réseaux de sécurité

27.

System and method for device attribute identification based on host configuration protocols

      
Numéro d'application 17655845
Numéro de brevet 12572846
Statut Délivré - en vigueur
Date de dépôt 2022-03-22
Date de la première publication 2023-09-28
Date d'octroi 2026-03-10
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron

Abrégé

A system and method for determining device attributes based on host configuration protocols. A method includes applying at least one machine learning model to a test data set extracted from host configuration protocol data including at least one test options sequence, wherein each test options sequence is an ordered series of options requested by a first device, wherein each of the at least one machine learning model is trained based on a train data set including a plurality of training options sequences and a plurality of device attributes, wherein each training options sequence and each device attribute of the train data set corresponds to a respective second device; and determining, based on the output of the at least one machine learning model, at least one device attribute for the first device.

Classes IPC  ?

28.

SYSTEM AND METHOD FOR DEVICE ATTRIBUTE IDENTIFICATION BASED ON HOST CONFIGURATION PROTOCOLS

      
Numéro d'application IB2023052802
Numéro de publication 2023/180944
Statut Délivré - en vigueur
Date de dépôt 2023-03-22
Date de publication 2023-09-28
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron

Abrégé

A system and method for determining device attributes based on host configuration protocols. A method includes applying at least one machine learning model to a test data set extracted from host configuration protocol data including at least one test options sequence, wherein each test options sequence is an ordered series of options requested by a first device, wherein each of the at least one machine learning model is trained based on a train data set including a plurality of training options sequences and a plurality of device attributes, wherein each training options sequence and each device attribute of the train data set corresponds to a respective second device; and determining, based on the output of the at least one machine learning model, at least one device attribute for the first device.

Classes IPC  ?

  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • H04W 12/72 - Identité de l’abonné
  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées

29.

DEVICE ATTRIBUTE DETERMINATION BASED ON PROTOCOL STRING CONVENTIONS

      
Numéro d'application IL2023050022
Numéro de publication 2023/131956
Statut Délivré - en vigueur
Date de dépôt 2023-01-06
Date de publication 2023-07-13
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Friedlander, Yuval

Abrégé

A system and method for determining device attributes based on protocol string conventions. A method includes applying at least one machine learning model to an application data set extracted based on at least one first pair of strings, each first pair of strings including a protocol string and a key string indicated in respective fields of communications session data corresponding to a device, wherein each machine learning model is trained based on a training data set including second pairs of strings device attribute labels, wherein each device attribute label corresponds to one of the second pairs of strings, wherein each of the at least one machine learning model is configured to output a predicted device attribute for the device based on the first pair of strings; and determining, based on the output of the at least one machine learning model, at least one device attribute of the device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06N 20/00 - Apprentissage automatique

30.

DEVICE ATTRIBUTE DETERMINATION BASED ON PROTOCOL STRING CONVENTIONS

      
Numéro d'application 17647266
Statut En instance
Date de dépôt 2022-01-06
Date de la première publication 2023-07-06
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Friedlander, Yuval

Abrégé

A system and method for determining device attributes based on protocol string conventions. A method includes applying at least one machine learning model to an application data set extracted based on at least one first pair of strings, each first pair of strings including a protocol string and a key string indicated in respective fields of communications session data corresponding to a device, wherein each machine learning model is trained based on a training data set including second pairs of strings device attribute labels, wherein each device attribute label corresponds to one of the second pairs of strings, wherein each of the at least one machine learning model is configured to output a predicted device attribute for the device based on the first pair of strings; and determining, based on the output of the at least one machine learning model, at least one device attribute of the device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 3/08 - Méthodes d'apprentissage
  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

31.

SYSTEM AND METHOD FOR INFERRING DEVICE TYPE BASED ON PORT USAGE

      
Numéro d'application IB2022060648
Numéro de publication 2023/084371
Statut Délivré - en vigueur
Date de dépôt 2022-11-04
Date de publication 2023-05-19
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Zvi, Gil Ben
  • Hanetz, Tom
  • Shoham, Ron

Abrégé

A system and method for inferring device types. A method includes selecting a device type inference model from among a plurality of device type inference models based on a manufacturer of a device, wherein each device type inference model corresponds to a respective manufacturer and is trained using training data of devices manufactured by the respective manufacturer, wherein each device type inference model is trained to output a device type prediction; and determining an inferred device type for the device, wherein determining the inferred device type for the device further comprises applying the selected device type inference model to a plurality of features, wherein the plurality of features is extracted from device activity data indicating ports used by the device and at least one volume of traffic communicated via each port used by the device.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 24/08 - Réalisation de tests en trafic réel

32.

System and method for inferring device type based on port usage

      
Numéro d'application 17523362
Numéro de brevet 12216459
Statut Délivré - en vigueur
Date de dépôt 2021-11-10
Date de la première publication 2023-05-11
Date d'octroi 2025-02-04
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron

Abrégé

A system and method for inferring device types. A method includes selecting a device type inference model from among a plurality of device type inference models based on a manufacturer of a device, wherein each device type inference model corresponds to a respective manufacturer and is trained using training data of devices manufactured by the respective manufacturer, wherein each device type inference model is trained to output a device type prediction; and determining an inferred device type for the device, wherein determining the inferred device type for the device further comprises applying the selected device type inference model to a plurality of features, wherein the plurality of features is extracted from device activity data indicating ports used by the device and at least one volume of traffic communicated via each port used by the device.

Classes IPC  ?

  • G05B 19/418 - Commande totale d'usine, c.-à-d. commande centralisée de plusieurs machines, p. ex. commande numérique directe ou distribuée [DNC], systèmes d'ateliers flexibles [FMS], systèmes de fabrication intégrés [IMS], productique [CIM]
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • H04L 9/40 - Protocoles réseaux de sécurité

33.

TECHNIQUES FOR ENRICHING DEVICE PROFILES AND MITIGATING CYBERSECURITY THREATS USING ENRICHED DEVICE PROFILES

      
Numéro d'application IB2022057676
Numéro de publication 2023/047206
Statut Délivré - en vigueur
Date de dépôt 2022-08-16
Date de publication 2023-03-30
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Hanetz, Tom

Abrégé

Systems and methods for device profile enrichment. A method includes determining a plurality of distributions of device attributes with respect to a plurality of fields of a predefined device profile schema; generating a plurality of inference rules based on the plurality of distributions of device attributes, wherein each inference rule indicates at least one required device attribute and at least one inferred device attribute; creating an ordered set of inference rules including the plurality of inference rules organized with respect to a plurality of scores, each score corresponding to one of the plurality of inference rules, wherein the score for each inference rule is determined based on the at least one required device attribute of the inference rule; and enriching at least one device profile by iterating the ordered set of inference rules, wherein enriching a device profile includes adding at least one device attribute value to the device profile.

Classes IPC  ?

  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 5/02 - Représentation de la connaissanceReprésentation symbolique
  • H04L 9/40 - Protocoles réseaux de sécurité

34.

Techniques for enriching device profiles and mitigating cybersecurity threats using enriched device profiles

      
Numéro d'application 17483360
Numéro de brevet 12052274
Statut Délivré - en vigueur
Date de dépôt 2021-09-23
Date de la première publication 2023-03-23
Date d'octroi 2024-07-30
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron

Abrégé

Systems and methods for device profile enrichment. A method includes determining a plurality of distributions of device attributes with respect to a plurality of fields of a predefined device profile schema; generating a plurality of inference rules based on the plurality of distributions of device attributes, wherein each inference rule indicates at least one required device attribute and at least one inferred device attribute; creating an ordered set of inference rules including the plurality of inference rules organized with respect to a plurality of scores, each score corresponding to one of the plurality of inference rules, wherein the score for each inference rule is determined based on the at least one required device attribute of the inference rule; and enriching at least one device profile by iterating the ordered set of inference rules, wherein enriching a device profile includes adding at least one device attribute value to the device profile.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • H04L 9/40 - Protocoles réseaux de sécurité

35.

TECHNIQUES FOR VALIDATING FEATURES FOR MACHINE LEARNING MODELS

      
Numéro d'application 17364065
Statut En instance
Date de dépôt 2021-06-30
Date de la première publication 2023-01-05
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Friedlander, Yuval
  • Hanetz, Tom
  • Ben Zvi, Gil

Abrégé

A system and method for machine learning features validation. A method includes: performing statistical testing on a plurality of pairs of features, each pair of features including a test feature of a plurality of test features extracted from a first data set and a corresponding training feature extracted from a second data set during a training phase for a machine learning model, wherein the statistical testing is performed under a null hypothesis that the first data set and the second data set are drawn from a same continuous distribution, wherein performing the statistical testing further comprises determining a degree to which each test feature of the plurality of pairs of features deviates from the corresponding training feature; and determining, based on the degree to which each test feature of the plurality of pairs of features deviates from the corresponding training feature, whether the plurality of test features is validated.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

36.

TECHNIQUES FOR VALIDATING MACHINE LEARNING MODELS

      
Numéro d'application 17364088
Statut En instance
Date de dépôt 2021-06-30
Date de la première publication 2023-01-05
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Friedlander, Yuval
  • Hanetz, Tom
  • Ben Zvi, Gil

Abrégé

A system and method for machine learning model validation. A method includes: determining a first score distribution for a first run of a machine learning model and a second score distribution for a second run of the machine learning model, wherein the first run includes applying the machine learning model to a first test dataset, wherein the second run includes applying the machine learning model to a second test dataset, wherein the second test dataset is collected after the first test dataset; comparing the first score distribution to the second score distribution; determining, based on the comparison, whether the machine learning model is validated; continuing use of the machine learning model when it is determined that the machine learning model is validated; and performing at least one rehabilitative action with respect to the machine learning model when it is determined that the machine learning model is not validated.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06N 7/00 - Agencements informatiques fondés sur des modèles mathématiques spécifiques
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

37.

TECHNIQUES FOR VALIDATING FEATURES FOR MACHINE LEARNING MODELS

      
Numéro d'application IB2022056011
Numéro de publication 2023/275754
Statut Délivré - en vigueur
Date de dépôt 2022-06-28
Date de publication 2023-01-05
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Friedlander, Yuval
  • Hanetz, Tom
  • Ben Zvi, Gil

Abrégé

A system and method for machine learning features validation. A method includes: performing statistical testing on a plurality of pairs of features, each pair of features including a test feature of a plurality of test features extracted from a first data set and a corresponding training feature extracted from a second data set during a training phase for a machine learning model, wherein the statistical testing is performed under a null hypothesis that the first data set and the second data set are drawn from a same continuous distribution, wherein performing the statistical testing further comprises determining a degree to which each test feature of the plurality of pairs of features deviates from the corresponding training feature; and determining, based on the degree to which each test feature of the plurality of pairs of features deviates from the corresponding training feature, whether the plurality of test features is validated.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06N 5/02 - Représentation de la connaissanceReprésentation symbolique
  • G06N 3/08 - Méthodes d'apprentissage

38.

TECHNIQUES FOR VALIDATING MACHINE LEARNING MODELS

      
Numéro d'application IB2022056012
Numéro de publication 2023/275755
Statut Délivré - en vigueur
Date de dépôt 2022-06-28
Date de publication 2023-01-05
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Friedlander, Yuval
  • Hanetz, Tom
  • Ben Zvi, Gil

Abrégé

A system and method for machine learning model validation. A method includes: determining a first score distribution for a first run of a machine learning model and a second score distribution for a second run of the machine learning model, wherein the first run includes applying the machine learning model to a first test dataset, wherein the second run includes applying the machine learning model to a second test dataset, wherein the second test dataset is collected after the first test dataset; comparing the first score distribution to the second score distribution; determining, based on the comparison, whether the machine learning model is validated; continuing use of the machine learning model when it is determined that the machine learning model is validated; and performing at least one rehabilitative action with respect to the machine learning model when it is determined that the machine learning model is not validated.

Classes IPC  ?

  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06N 20/00 - Apprentissage automatique
  • G06N 3/08 - Méthodes d'apprentissage

39.

Techniques for detecting exploitation of manufacturing device vulnerabilities

      
Numéro d'application 17821914
Numéro de brevet 12373567
Statut Délivré - en vigueur
Date de dépôt 2022-08-24
Date de la première publication 2022-12-29
Date d'octroi 2025-07-29
Propriétaire Armis Security Ltd. (USA)
Inventeur(s)
  • Gitelman, Shaked
  • Ravid, Tal

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes determining exploitation conditions for a manufacturing device based on a first set of device attributes of the manufacturing device and a second set of device attributes indicated in a vulnerabilities database; analyzing behavior and configuration of the manufacturing device to detect an exploitable vulnerability for the manufacturing device, wherein the exploitable vulnerability is a behavior or configuration of the manufacturing device which meets the exploitation conditions; and performing mitigation actions based on the exploitable vulnerability. The vulnerabilities database further indicates known exploits for the second set of device attributes. Analyzing the behavior and configuration of the manufacturing device includes identifying that a port is open and querying a vulnerability scanner for identifying information of the open port, wherein the currently exploitable vulnerability is detected based further on the identifying information of the open port.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

40.

Techniques for securing network environments by identifying device attributes based on string field conventions

      
Numéro d'application 17344294
Numéro de brevet 12026248
Statut Délivré - en vigueur
Date de dépôt 2021-06-10
Date de la première publication 2022-12-15
Date d'octroi 2024-07-02
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Hanetz, Tom
  • Friedlander, Yuval
  • Ben Zvi, Gil

Abrégé

A system and method for identifying device attributes based on string field conventions. A method includes applying at least one machine learning model to an application data set extracted based on a string indicated in a field of device data corresponding to a device, wherein each of the at least one machine learning model is trained based on a training data set including a plurality of second strings and a plurality of device attribute labels, wherein each device attribute label corresponds to a respective second string of the plurality of second strings, wherein each of the at least one machine learning model is configured to output a predicted device attribute for the device based on the first string; and identifying, based on the output of the at least one machine learning model, a device attribute of the device.

Classes IPC  ?

  • G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

41.

TECHNIQUES FOR SECURING NETWORK ENVIRONMENTS BY IDENTIFYING DEVICE ATTRIBUTES BASED ON STRING FIELD CONVENTIONS

      
Numéro d'application IB2022055209
Numéro de publication 2022/259111
Statut Délivré - en vigueur
Date de dépôt 2022-06-03
Date de publication 2022-12-15
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Friedlander, Yuval
  • Ben Zvi, Gil
  • Hanetz, Tom

Abrégé

A system and method for identifying device attributes based on string field conventions. A method includes applying at least one machine learning model to an application data set extracted based on a string indicated in a field of device data corresponding to a device, wherein each of the at least one machine learning model is trained based on a training data set including a plurality of second strings and a plurality of device attribute labels, wherein each device attribute label corresponds to a respective second string of the plurality of second strings, wherein each of the at least one machine learning model is configured to output a predicted device attribute for the device based on the first string; and identifying, based on the output of the at least one machine learning model, a device attribute of the device.

Classes IPC  ?

  • H04W 12/122 - Contre-mesures pour parer aux attaquesProtection contre les dispositifs malveillants
  • G06N 20/00 - Apprentissage automatique
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique

42.

TECHNIQUES FOR DETECTING EXPLOITATION OF MEDICAL DEVICE VULNERABILITIES

      
Numéro d'application 17809732
Statut En instance
Date de dépôt 2022-06-29
Date de la première publication 2022-10-13
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Gitelman, Shaked
  • Ravid, Tal

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a medical device based on at least one first device attribute of the medical device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and configuration of the medical device to detect an exploitable vulnerability for the medical device, wherein the exploitable vulnerability is a behavior or configuration of the medical device which meets the at least one exploitation condition; and performing at least one mitigation action based on the exploitable vulnerability.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 16/245 - Traitement des requêtes
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

43.

SYSTEM AND METHOD FOR DETECTION OF ABNORMAL DEVICE TRAFFIC BEHAVIOR

      
Numéro d'application IB2022052894
Numéro de publication 2022/208350
Statut Délivré - en vigueur
Date de dépôt 2022-03-29
Date de publication 2022-10-06
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron
  • Friedlander, Yuval

Abrégé

A system and method for detecting abnormal device traffic behavior. The method includes creating a baseline clustering model for a device based on a training data set including traffic data for the device, wherein the baseline clustering model includes a plurality of clusters, each cluster representing a discrete state and including a plurality of first data points of the training data set; sampling a plurality of second data points with respect to windows of time in order to create at least one sample, each sample including at least a portion of the plurality of second data points, wherein the plurality of second data points are related to traffic involving the device; and detecting anomalous traffic behavior of the device based on the at least one sample and the baseline clustering model.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet

44.

System and method for detection of abnormal device traffic behavior

      
Numéro d'application 17215809
Numéro de brevet 12225027
Statut Délivré - en vigueur
Date de dépôt 2021-03-29
Date de la première publication 2022-09-29
Date d'octroi 2025-02-11
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Luk-Zilberman, Evgeny
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Shoham, Ron
  • Friedlander, Yuval

Abrégé

A system and method for detecting abnormal device traffic behavior. The method includes creating a baseline clustering model for a device based on a training data set including traffic data for the device, wherein the baseline clustering model includes a plurality of clusters, each cluster representing a discrete state and including a plurality of first data points of the training data set; sampling a plurality of second data points with respect to windows of time in order to create at least one sample, each sample including at least a portion of the plurality of second data points, wherein the plurality of second data points are related to traffic involving the device; and detecting anomalous traffic behavior of the device based on the at least one sample and the baseline clustering model.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06N 20/00 - Apprentissage automatique

45.

System and method for operating system distribution and version identification using communications security fingerprints

      
Numéro d'application 17188879
Numéro de brevet 12375481
Statut Délivré - en vigueur
Date de dépôt 2021-03-01
Date de la première publication 2022-09-01
Date d'octroi 2025-07-29
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Sarel, Yuval
  • Seri, Ben
  • Friedlander, Yuval
  • Hanetz, Tom
  • Ben Zvi, Gil
  • Shoham, Ron

Abrégé

A system and method for inferring an operating system version for a device based on communications security data. A method includes identifying a plurality of sequences in communications security data sent by the device; determining an operating system type of an operating system used by the device based on the identified plurality of sequences; applying a version-identifying model to the identified plurality of sequences, wherein the version-identifying model is a machine learning model trained to output a version identifier, wherein the applied version-identifying model is associated with the determined operating system type; and determining the operating system version of the device based on the output of the version-identifying model.

Classes IPC  ?

  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique
  • H04L 9/40 - Protocoles réseaux de sécurité

46.

System and method for mitigating cyber security threats by devices using risk factors

      
Numéro d'application 17662529
Numéro de brevet 12015634
Statut Délivré - en vigueur
Date de dépôt 2022-05-09
Date de la première publication 2022-08-18
Date d'octroi 2024-06-18
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Izrael, Nadir
  • Ladelsky Lellouch, Shiri
  • Seltzer, Misha

Abrégé

A system and method for mitigating cyber security threats by devices using risk factors. The method includes determining a plurality of risk factors for a device based on a plurality of risk behaviors indicated by network activity and information of the device, wherein the plurality of risk behaviors includes observed risk behaviors and assumed risk behaviors, wherein the observed risk behaviors are indicated by data related to network activity by the device, wherein the assumed risk behaviors are extrapolated based on known contextual information related to the device; determining a risk score for the device based on the plurality of risk factors and a plurality of weights, wherein each of the plurality of weights is applied to one of the plurality of risk factors; and performing at least one mitigation action based on the risk score.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

47.

SYSTEM AND METHOD FOR SECURING NETWORKS BASED ON CATEGORICAL FEATURE DISSIMILARITIES

      
Numéro d'application IB2022050643
Numéro de publication 2022/162530
Statut Délivré - en vigueur
Date de dépôt 2022-01-25
Date de publication 2022-08-04
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Ben Zvi, Gil
  • Shoham, Ron
  • Hanetz, Tom
  • Friedlander, Yuval

Abrégé

A system and method for detecting deviations from baseline behavior patterns for categorical features. A method includes determining a first discrete probability distribution for a categorical variable based on a first set of network activity data; determining a second discrete probability distribution for a unique observation based on a second set of network activity data; comparing the second discrete probability distribution to the first discrete probability distribution by applying a distance function to the first and second discrete probability distributions, wherein an output of the distance function is a scalar value representing a difference between the first and second discrete probability distributions; determining whether the scalar value is above a threshold; detecting an anomaly with respect to the categorical variable when the scalar value is above the threshold; and determining that a behavior with respect to the categorical variable is normal when the scalar value is not above the threshold.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/142 - Analyse ou conception de réseau en utilisant des méthodes statistiques ou mathématiques

48.

SYSTEM AND METHOD FOR SECURING NETWORKS BASED ON CATEGORICAL FEATURE DISSIMILARITIES

      
Numéro d'application 17161229
Statut En instance
Date de dépôt 2021-01-28
Date de la première publication 2022-07-28
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Ben Zvi, Gil
  • Shoham, Ron
  • Hanetz, Tom
  • Friedlander, Yuval

Abrégé

A system and method for detecting deviations from baseline behavior patterns for categorical features. A method includes determining a first discrete probability distribution for a categorical variable based on a first set of network activity data; determining a second discrete probability distribution for a unique observation based on a second set of network activity data; comparing the second discrete probability distribution to the first discrete probability distribution by applying a distance function to the first and second discrete probability distributions, wherein an output of the distance function is a scalar value representing a difference between the first and second discrete probability distributions; determining whether the scalar value is above a threshold; detecting an anomaly with respect to the categorical variable when the scalar value is above the threshold; and determining that a behavior with respect to the categorical variable is normal when the scalar value is not above the threshold.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

49.

SYSTEM AND METHOD FOR ANOMALY DETECTION INTERPRETATION

      
Numéro d'application IB2021059726
Numéro de publication 2022/101722
Statut Délivré - en vigueur
Date de dépôt 2021-10-21
Date de publication 2022-05-19
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Shoham, Ron
  • Ben Zvi, Gil
  • Hanetz, Tom

Abrégé

A system and method for anomaly interpretation and mitigation. A method includes extracting at least one input feature vector from observation data related to an observation; applying an isolation forest to the at least one input feature vector, wherein the isolation forest includes a plurality of estimators, wherein each estimator is a decision tree, wherein the output of each estimator is a split-path of a plurality of split-paths, each split-path having a path-length and including name and a corresponding value for a respective output feature of a plurality of output features; generating a mapping object based on the application of the isolation forest to the at least one feature vector, wherein the mapping object includes the plurality of split-paths; clipping the mapping object based on the path-length of each split-path; and determining at least one mitigation action based on the clipped mapping object.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G05B 23/02 - Test ou contrôle électrique

50.

System and method for anomaly detection interpretation

      
Numéro d'application 17093915
Numéro de brevet 11824877
Statut Délivré - en vigueur
Date de dépôt 2020-11-10
Date de la première publication 2022-05-12
Date d'octroi 2023-11-21
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Friedlander, Yuval
  • Shoham, Ron
  • Ben Zvi, Gil
  • Hanetz, Tom

Abrégé

A system and method for anomaly interpretation and mitigation. A method includes extracting at least one input feature vector from observation data related to an observation; applying an isolation forest to the at least one input feature vector, wherein the isolation forest includes a plurality of estimators, wherein each estimator is a decision tree, wherein the output of each estimator is a split-path of a plurality of split-paths, each split-path having a path-length and including name and a corresponding value for a respective output feature of a plurality of output features; generating a mapping object based on the application of the isolation forest to the at least one feature vector, wherein the mapping object includes the plurality of split-paths; clipping the mapping object based on the path-length of each split-path; and determining at least one mitigation action based on the clipped mapping object.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

51.

System and method for inferring device model based on media access control address

      
Numéro d'application 16868914
Numéro de brevet 11526392
Statut Délivré - en vigueur
Date de dépôt 2020-05-07
Date de la première publication 2021-11-11
Date d'octroi 2022-12-13
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Hanetz, Tom
  • Friedlander, Yuval
  • Ben Zvi, Gil

Abrégé

A system and method for inferring device models. The method includes determining block statistics for each block of a plurality of blocks of a plurality of media access control (MAC) addresses, the plurality of blocks having a plurality of respective prefixes, wherein the plurality of blocks are grouped based on commonalities among the plurality of respective prefixes; generating an aggregated statistical model for the plurality of blocks based on the plurality of MAC addresses and the block statistics, wherein each block is a string of digits included in one of the plurality of MAC addresses; and applying the aggregated statistical model to the block statistics of at least one block of the plurality of blocks in order to determine at least one inferred device model, wherein each of the at least one block is grouped into the same group.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
  • G06N 7/00 - Agencements informatiques fondés sur des modèles mathématiques spécifiques

52.

SYSTEM AND METHOD FOR INFERRING DEVICE MODEL BASED ON MEDIA ACCESS CONTROL ADDRESS

      
Numéro d'application IB2021053648
Numéro de publication 2021/224744
Statut Délivré - en vigueur
Date de dépôt 2021-04-30
Date de publication 2021-11-11
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Shoham, Ron
  • Hanetz, Tom
  • Friedlander, Yuval
  • Ben Zvi, Gil

Abrégé

A system and method for inferring device models. The method includes determining block statistics for each block of a plurality of blocks of a plurality of media access control (MAC) addresses, the plurality of blocks having a plurality of respective prefixes, wherein the plurality of blocks are grouped based on commonalities among the plurality of respective prefixes; generating an aggregated statistical model for the plurality of blocks based on the plurality of MAC addresses and the block statistics, wherein each block is a string of digits included in one of the plurality of MAC addresses; and applying the aggregated statistical model to the block statistics of at least one block of the plurality of blocks in order to determine at least one inferred device model, wherein each of the at least one block is grouped into the same group.

Classes IPC  ?

  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données

53.

TECHNIQUES FOR DETECTING EXPLOITATION OF MEDICAL DEVICE VULNERABILITIES

      
Numéro d'application IB2021050432
Numéro de publication 2021/171105
Statut Délivré - en vigueur
Date de dépôt 2021-01-20
Date de publication 2021-09-02
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Gitelman, Shaked
  • Ravid, Tal

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a medical device based on at least one first device attribute of the medical device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and configuration of the medical device to detect an exploitable vulnerability for the medical device, wherein the exploitable vulnerability is a behavior or configuration of the medical device which meets the at least one exploitation condition; and performing at least one mitigation action based on the exploitable vulnerability.

Classes IPC  ?

  • A61N 1/00 - ÉlectrothérapieCircuits à cet effet
  • A61N 1/37 - SurveillanceProtection
  • A61N 1/372 - Aménagements en relation avec l'implantation des stimulateurs

54.

TECHNIQUES FOR DETECTING EXPLOITATION OF MANUFACTURING DEVICE VULNERABILITIES

      
Numéro d'application IB2021050433
Numéro de publication 2021/171106
Statut Délivré - en vigueur
Date de dépôt 2021-01-20
Date de publication 2021-09-02
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Gitelman, Shaked
  • Ravid, Tal

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a manufacturing device based on at least one first device attribute of the manufacturing device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and configuration of the medical device to detect an exploitable vulnerability for the manufacturing device, wherein the exploitable vulnerability is a behavior or configuration of the manufacturing device which meets the at least one exploitation condition; and performing at least one mitigation action based on the exploitable vulnerability.

Classes IPC  ?

  • A61N 1/00 - ÉlectrothérapieCircuits à cet effet
  • A61N 1/37 - SurveillanceProtection
  • A61N 1/372 - Aménagements en relation avec l'implantation des stimulateurs

55.

Techniques for detecting exploitation of medical device vulnerabilities

      
Numéro d'application 16801681
Numéro de brevet 11481503
Statut Délivré - en vigueur
Date de dépôt 2020-02-26
Date de la première publication 2021-08-26
Date d'octroi 2022-10-25
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Gitelman, Shaked
  • Ravid, Tai

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a medical device based on at least one first device attribute of the medical device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and configuration of the medical device to detect an exploitable vulnerability for the medical device, wherein the exploitable vulnerability is a behavior or configuration of the medical device which meets the at least one exploitation condition; and performing at least one mitigation action based on the exploitable vulnerability.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 16/245 - Traitement des requêtes
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

56.

Techniques for detecting exploitation of manufacturing device vulnerabilities

      
Numéro d'application 16801748
Numéro de brevet 11841952
Statut Délivré - en vigueur
Date de dépôt 2020-02-26
Date de la première publication 2021-08-26
Date d'octroi 2023-12-12
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Gitelman, Shaked
  • Ravid, Tal

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes: determining at least one exploitation condition for a manufacturing device based on at least one first device attribute of the manufacturing device and a plurality of second device attributes indicated in a vulnerabilities database, wherein the vulnerabilities database further indicates a plurality of known exploits for the plurality of second device attributes; analyzing behavior and configuration of the medical device to detect an exploitable vulnerability for the manufacturing device, wherein the exploitable vulnerability is a behavior or configuration of the manufacturing device which meets the at least one exploitation condition; and performing at least one mitigation action based on the exploitable vulnerability.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 20/00 - Apprentissage automatique

57.

System and method for inferring operating systems using transmission control protocol fingerprints

      
Numéro d'application 16927299
Numéro de brevet 11102082
Statut Délivré - en vigueur
Date de dépôt 2020-07-13
Date de la première publication 2021-08-24
Date d'octroi 2021-08-24
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Sarel, Yuval
  • Seri, Ben
  • Ben Zvi, Gil
  • Hanetz, Tom
  • Friedlander, Yuval
  • Shoham, Ron

Abrégé

A system and method for inferring device operating systems. A method includes applying a sequence-based model to an option-types sequence in order to output a plurality of first features, wherein each of the first features is a value representing a probability that the options-type sequence is associated with a respective operating system; applying a distribution dissimilarity model to metadata field distribution data extracted from the headers of the packets sent by the device in order to output a plurality of second features, wherein the plurality of second features includes a plurality of distances, wherein each distance is based on a difference between a distribution of values of each metadata field indicated in the metadata field distribution data; and applying an operating system inference model to the plurality of first features and the plurality of second features in order to output an inferred operating system for the device.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • G06N 7/00 - Agencements informatiques fondés sur des modèles mathématiques spécifiques
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique
  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

58.

SYSTEM AND METHOD FOR DETERMINING DEVICE ATTRIBUTES USING A CLASSIFIER HIERARCHY

      
Numéro d'application IB2020062495
Numéro de publication 2021/137138
Statut Délivré - en vigueur
Date de dépôt 2020-12-28
Date de publication 2021-07-08
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Hanetz, Tom
  • Friedlander, Yuval

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes: sequentially applying a plurality of sub-models of a hierarchy to a plurality of features extracted from device activity data, wherein the sequential application ends with applying a last sub-model of the plurality of sub-models, wherein each sub-model includes a plurality of classifiers, wherein each sub-model outputs a class when applied to at least a portion of the plurality of features, wherein each class is a classifier output representing a device attribute, wherein applying the plurality of sub-models further comprises iteratively determining a next sub-model to apply based on the class output by a most recently applied sub-model and the hierarchy; and determining a device attribute based on the class output by the last sub-model.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

59.

System and method for determining device attributes using a classifier hierarchy

      
Numéro d'application 16729823
Numéro de brevet 11983611
Statut Délivré - en vigueur
Date de dépôt 2019-12-30
Date de la première publication 2021-07-01
Date d'octroi 2024-05-14
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Hanetz, Tom
  • Friedlander, Yuval

Abrégé

A system and method for determining device attributes using a classifier hierarchy. The method includes: sequentially applying a plurality of sub-models of a hierarchy to a plurality of features extracted from device activity data, wherein the sequential application ends with applying a last sub-model of the plurality of sub-models, wherein each sub-model includes a plurality of classifiers, wherein each sub-model outputs a class when applied to at least a portion of the plurality of features, wherein each class is a classifier output representing a device attribute, wherein applying the plurality of sub-models further comprises iteratively determining a next sub-model to apply based on the class output by a most recently applied sub-model and the hierarchy; and determining a device attribute based on the class output by the last sub-model.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06F 16/35 - PartitionnementClassement
  • G06F 18/2113 - Sélection du sous-ensemble de caractéristiques le plus significatif en classant ou en filtrant l'ensemble des caractéristiques, p. ex. en utilisant une mesure de la variance ou de la corrélation croisée des caractéristiques
  • G06F 18/213 - Extraction de caractéristiques, p. ex. en transformant l'espace des caractéristiquesSynthétisationsMappages, p. ex. procédés de sous-espace
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06F 18/24 - Techniques de classification
  • G06F 18/241 - Techniques de classification relatives au modèle de classification, p. ex. approches paramétriques ou non paramétriques
  • G06F 18/2431 - Classes multiples
  • G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
  • G06V 30/24 - Reconnaissance de caractères caractérisée par la méthode de traitement ou de reconnaissance

60.

TECHNIQUES FOR RESOLVING CONTRADICTORY DEVICE PROFILING DATA

      
Numéro d'application IB2020061713
Numéro de publication 2021/124027
Statut Délivré - en vigueur
Date de dépôt 2020-12-09
Date de publication 2021-06-24
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Gitelman, Shaked
  • Krespil-Lo, Adi

Abrégé

A system and method for resolving contradictory device profiling data. The method includes: determining a set of non-contradicting values and a set of contradicting values in device profiling data related to a device based on a plurality of conflict rules; merging values of the set of non-contradicting values in device profiling data into at least one first value; selecting at least one second value from the set of contradicting values, wherein selecting one of the at least one second value from each set of contradicting values further includes generating a certainty score corresponding to each value of the set of contradicting values, wherein each certainty score indicates a likelihood that the corresponding value is accurate, wherein the at least one second value is selected based on the certainty scores; and creating a device profile based on the at least one first value and the at least one second value.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 8/00 - Gestion de données relatives au réseau

61.

Techniques for resolving contradictory device profiling data

      
Numéro d'application 16715464
Numéro de brevet 11956252
Statut Délivré - en vigueur
Date de dépôt 2019-12-16
Date de la première publication 2021-06-17
Date d'octroi 2024-04-09
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Gitelman, Shaked
  • Krespil-Lo, Adi

Abrégé

A system and method for resolving contradictory device profiling data. The method includes: determining a set of non-contradicting values and a set of contradicting values in device profiling data related to a device based on a plurality of conflict rules; merging values of the set of non-contradicting values in device profiling data into at least one first value; selecting at least one second value from the set of contradicting values, wherein selecting one of the at least one second value from each set of contradicting values further includes generating a certainty score corresponding to each value of the set of contradicting values, wherein each certainty score indicates a likelihood that the corresponding value is accurate, wherein the at least one second value is selected based on the certainty scores; and creating a device profile based on the at least one first value and the at least one second value.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/303 - Profils des terminaux

62.

SYSTEM AND METHOD FOR MITIGATING CYBER SECURITY THREATS

      
Numéro d'application US2020023557
Numéro de publication 2020/205258
Statut Délivré - en vigueur
Date de dépôt 2020-03-19
Date de publication 2020-10-08
Propriétaire
  • ARMIS SECURITY LTD. (Israël)
  • ARMIS INC. (USA)
Inventeur(s)
  • Izrael, Nadir
  • Ladelsky Lellouch, Shiri
  • Seltzer, Misha

Abrégé

A system and method for mitigating cyber security threats by devices using risk factors. The method includes determining a plurality of risk factors for a device based on a plurality of risk behaviors indicated by network activity and information of the device; determining a risk score for the device based on the plurality of risk factors and a plurality of weights, wherein each of the plurality of weights is applied to one of the plurality of risk factors; and performing at least one mitigation action based on the risk score.

Classes IPC  ?

  • G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
  • H04L 29/14 - Contre-mesures pour remédier à un défaut

63.

System and method for mitigating cyber security threats by devices using risk factors

      
Numéro d'application 16371794
Numéro de brevet 11363051
Statut Délivré - en vigueur
Date de dépôt 2019-04-01
Date de la première publication 2020-10-01
Date d'octroi 2022-06-14
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Izrael, Nadir
  • Ladelsky Lellouch, Shiri
  • Seltzer, Misha

Abrégé

A system and method for mitigating cyber security threats by devices using risk factors. The method includes determining a plurality of risk factors for a device based on a plurality of risk behaviors indicated by network activity and information of the device; determining a risk score for the device based on the plurality of risk factors and a plurality of weights, wherein each of the plurality of weights is applied to one of the plurality of risk factors; and performing at least one mitigation action based on the risk score.

Classes IPC  ?

  • G08B 23/00 - Alarmes réagissant à des conditions indésirables ou anormales, non spécifiées
  • G06F 12/16 - Protection contre la perte de contenus de mémoire
  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures

64.

Detection of vulnerable devices in wireless networks

      
Numéro d'application 16703520
Numéro de brevet 11102233
Statut Délivré - en vigueur
Date de dépôt 2019-12-04
Date de la première publication 2020-04-09
Date d'octroi 2021-08-24
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Schwartz, Tomer
  • Izrael, Nadir

Abrégé

A method and system for detecting vulnerable wireless devices operating in a wireless environment of an organization are provided. The method includes identifying a plurality of wireless devices operable in the wireless environment; for each identified wireless device: receiving intercepted traffic transmitted by the wireless device, wherein the intercepted traffic is transported using at least one type of wireless protocol; analyzing the intercepted traffic to determine if the wireless device is vulnerable, wherein the analysis is performed using an at least one investigation action; computing a risk score based on results of each of the least one investigation action; determining, based on the computed risk scores, if the wireless device is as vulnerable; and generating an alert, when it is determined that the wireless device is vulnerable.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 24/04 - Configurations pour maintenir l'état de fonctionnement
  • H04W 12/086 - Sécurité d'accès utilisant les domaines de sécurité
  • H04W 8/22 - Traitement ou transfert des données du terminal, p. ex. statut ou capacités physiques
  • H04W 8/00 - Gestion de données relatives au réseau
  • H04W 24/08 - Réalisation de tests en trafic réel

65.

Sensor-based wireless network vulnerability detection

      
Numéro d'application 15635465
Numéro de brevet 10505967
Statut Délivré - en vigueur
Date de dépôt 2017-06-28
Date de la première publication 2019-12-10
Date d'octroi 2019-12-10
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Schwartz, Tomer
  • Izrael, Nadir

Abrégé

Certain embodiments disclosed herein include a method for detecting potential vulnerabilities in a wireless environment. The method comprises collecting, by a network sensor deployed in the wireless environment, at least wireless traffic data; analyzing the collected wireless traffic data to detect at least activity initiated by a wireless entity in the wireless environment; sending, to a control system, data indicating the detected wireless entity; and enforcing a security policy on the detected wireless entity based on instructions received from the control system.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 24/08 - Réalisation de tests en trafic réel
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04W 12/08 - Sécurité d'accès

66.

Network sensor and method thereof for wireless network vulnerability detection

      
Numéro d'application 15635472
Numéro de brevet 10498758
Statut Délivré - en vigueur
Date de dépôt 2017-06-28
Date de la première publication 2019-12-03
Date d'octroi 2019-12-03
Propriétaire Armis Security Ltd. (Israël)
Inventeur(s)
  • Schwartz, Tomer
  • Izrael, Nadir

Abrégé

Certain embodiments disclosed herein include a method for detecting potential vulnerabilities in a wireless environment. The method comprises collecting, by a network sensor deployed in the wireless environment, at least wireless traffic data; analyzing the collected wireless traffic data to detect at least activity initiated by a wireless entity in the wireless environment; sending, to a control system, data indicating the detected wireless entity; and enforcing a security policy on the detected wireless entity based on instructions received from the control system.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/26 - Dispositions de surveillance; Dispositions de test

67.

Detection of vulnerable wireless networks

      
Numéro d'application 15339229
Numéro de brevet 11824880
Statut Délivré - en vigueur
Date de dépôt 2016-10-31
Date de la première publication 2018-05-03
Date d'octroi 2023-11-21
Propriétaire ARMIS SECURITY LTD. (Israël)
Inventeur(s)
  • Schwartz, Tomer
  • Izrael, Nadir

Abrégé

A method and system for detecting vulnerable wireless networks coexisting in a wireless environment of an organization are provided. The method includes receiving intercepted traffic, wherein the intercepted traffic is transmitted by at least one wireless device operable in an airspace of the wireless environment, wherein the intercepted traffic is transported using at least one type of wireless protocol; analyzing the received traffic to detect at least one active connection between a legitimate wireless device of the at least one wireless device and at least one unknown wireless device, wherein the legitimate wireless device is at least legitimately authorized to access a protected computing resource of the organization; and determining if the at least one detected active connection forms a vulnerable wireless network.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/12 - Détection ou prévention de fraudes
  • H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]
  • H04W 12/67 - Sécurité dépendant du contexte dépendant du risque, p. ex. choix du niveau de sécurité selon les profils de risque

68.

ARMIS

      
Numéro de série 87105826
Statut Enregistrée
Date de dépôt 2016-07-15
Date d'enregistrement 2019-12-24
Propriétaire Armis Security Ltd. (Israël)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software and hardware for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security Software as a service (SAAS) services featuring software for use in the detection, analysis, mitigation and resolution of threats in the field of cyber security